使用Player FM应用程序离线!
352: Baby's First Hydrofluoric Acid
已归档的系列专辑 ("不活跃的收取点" status)
When? This feed was archived on March 13, 2022 13:28 (). Last successful fetch was on February 09, 2022 23:18 ()
Why? 不活跃的收取点 status. 我们的伺服器已尝试了一段时间,但仍然无法截取有效的播客收取点
What now? You might be able to find a more up-to-date version using the search function. This series will no longer be checked for updates. If you believe this to be in error, please check if the publisher's feed link below is valid and contact support to request the feed be restored or if you have any other concerns about this.
Manage episode 278123215 series 1946409
John McMaster (@johndmcmaster) told us about the process of opening up chips to see how the processors are structured and what the firmware says.
See John’s website for information on getting started (as well as digging much deeper).
John has given some interesting Hardwear.io talks including Capturing Mask ROMs and Taming Hydrofluoric Acid to Extract Firmware. His talks and many others are available on the Hardwear.io archive. Or sign up for the Hardwear.io Online Hardware Security Training, Berlin Jan 2021.
As mentioned in the show:
John wrote a blog post about his top lab accidents and explosions.
Paper: Reverse engineering Flash EEPROM memories using Scanning Electron Microscopy by Franck Courbon, Sergei Skorobogatov, and Christopher Woods
Rompar and bitract are the two programs mentioned as helpful for getting from an image to binary code.
234集单集
已归档的系列专辑 ("不活跃的收取点" status)
When? This feed was archived on March 13, 2022 13:28 (). Last successful fetch was on February 09, 2022 23:18 ()
Why? 不活跃的收取点 status. 我们的伺服器已尝试了一段时间,但仍然无法截取有效的播客收取点
What now? You might be able to find a more up-to-date version using the search function. This series will no longer be checked for updates. If you believe this to be in error, please check if the publisher's feed link below is valid and contact support to request the feed be restored or if you have any other concerns about this.
Manage episode 278123215 series 1946409
John McMaster (@johndmcmaster) told us about the process of opening up chips to see how the processors are structured and what the firmware says.
See John’s website for information on getting started (as well as digging much deeper).
John has given some interesting Hardwear.io talks including Capturing Mask ROMs and Taming Hydrofluoric Acid to Extract Firmware. His talks and many others are available on the Hardwear.io archive. Or sign up for the Hardwear.io Online Hardware Security Training, Berlin Jan 2021.
As mentioned in the show:
John wrote a blog post about his top lab accidents and explosions.
Paper: Reverse engineering Flash EEPROM memories using Scanning Electron Microscopy by Franck Courbon, Sergei Skorobogatov, and Christopher Woods
Rompar and bitract are the two programs mentioned as helpful for getting from an image to binary code.
234集单集
所有剧集
×欢迎使用Player FM
Player FM正在网上搜索高质量的播客,以便您现在享受。它是最好的播客应用程序,适用于安卓、iPhone和网络。注册以跨设备同步订阅。